And here is a quote from Ian's blog.

And although the authentication wheel is round, that doesn’t mean it isn’t
> without its lumps. First, we do see some reinventing the wheel just to
> reinvent the wheel. OAuth A4C is simply not a fruitful activity and should
> be put down.



> (Source)
> http://www.tuesdaynight.org/2014/07/23/do-we-have-a-round-wheel-yet-musings-on-identity-standards-part-1.html



2014-07-23 16:53 GMT-04:00 John Bradley <ve7...@ve7jtb.com>:

> I thought I did post this to the list.
>
> I guess I hit the wrong reply on my phone.
>
> John B.
> Sent from my iPhone
>
> On Jul 23, 2014, at 4:50 PM, tors...@lodderstedt.net wrote:
>
> we are two, at least :-)
>
> Why didn't you post this on the list?
>
> When will be be arriving?
>
> Am 23.07.2014 16:39, schrieb John Bradley:
>
> Ian Glazer mentioned this in his keynote at CIS yesterday.
>
> His advice was please stop,  we are creating confusion and uncertainty.
>
> We are becoming our own wort enemy. ( my view though Ian may share it)
>
> Returning just an id_ token from the token endpoint has little real value.
>
> Something really useful to do would be sorting out channel_id so we can do
> PoP for id tokens to make them and other cookies secure in the front
> channel.   I think that is a better use of time.
>
> I may be in the minority opinion on that,  it won't be the first time.
>
>
> John B.
> Sent from my iPhone
>
> On Jul 23, 2014, at 4:04 PM, Torsten Lodderstedt <tors...@lodderstedt.net>
> wrote:
>
>  You are right from a theoretical perspective. Practically this was
> caused by editorial decisions during the creation of the RFC. As far as I
> remember, there was a definition of the (one) token endpoint response in
> early versions. No one every considered to NOT respond with an access token
> from the token endpoint. So one might call it an implicit assumption.
>
> I'm worried that people get totally confused if an exception is introduced
> now given the broad adoption of OAuth based on this assumption.
>
> regards,
> Torsten.
>
> Am 23.07.2014 um 15:41 schrieb Thomas Broyer <t.bro...@gmail.com>:
>
>  Is it said anywhere that ALL grant types MUST use Section 5.1 responses?
> Each grant type references Section 5.1, and "access token request" is only
> defined in the context of the defined grant types. Section 2.2 doesn't talk
> about the request or response format.
> Le 23 juil. 2014 21:32, "Nat Sakimura" <sakim...@gmail.com> a écrit :
>
>> Is it? Apart from the implicit grant that does not use token endpoint,
>> all other grant references section 5.1 for the response, i.e., all shares
>> the same response.
>>
>>
>> 2014-07-23 15:18 GMT-04:00 Thomas Broyer <t.bro...@gmail.com>:
>>
>>> I hadn't realized the JSON response that requires the access_token field
>>> is defined per grant_type, so I'd be OK to "extend the semantics" as in the
>>> current draft.
>>> That was actually my main concern: that the token endpoint mandates
>>> access_token; but its actually not the case.
>>> Le 23 juil. 2014 20:46, "Nat Sakimura" <sakim...@gmail.com> a écrit :
>>>
>>>  I agree with John that overloading response_type @ authz endpoint is a
>>>> bad idea. It completely changes the semantics of this parameter. NOTE: what
>>>> I was proposing was not this parameter, but a new parameter response_type @
>>>> token endpoint.
>>>>
>>>> I also think overloading grant_type is a bad idea since it changes its
>>>> semantics. I quote the definition here again:
>>>>
>>>>  grant
>>>>     credential representing the resource owner's authorization
>>>>
>>>> grant_type
>>>>  type of grant sent to the token endpoint to obtain the access token
>>>>
>>>> It is not about controlling what is to be returned from the token
>>>> endpoint, but the hint to the token endpoint describing the type of
>>>> credential the endpoint has received. It seems the "control of what is
>>>> being returned from token endpoint"  is just a side effect.
>>>>
>>>> I am somewhat ambivalent[1] in changing the semantics of token
>>>> endpoint, but in as much as "text is the king" for a spec., we probably
>>>> should not change the semantics of it as Torsten points out. If it is ok to
>>>> change this semantics, I believe defining a new parameter to this endpoint
>>>> to control the response would be the best way to go. This is what I have
>>>> described previously.
>>>>
>>>> Defining a new endpoint to send code to get ID Token and forbidding the
>>>> use of it against token endpoint would not change the semantics of any
>>>> existing parameter or endpoint, which is good. However, I doubt if it is
>>>> not worth doing. What's the point of avoiding access token scoped to
>>>> UserInfo endpoint after all? Defining a new endpoint for just avoiding the
>>>> access token for userinfo endpoint seems way too much the heavy wait way
>>>> and it breaks interoperabiliy: it defeats the purpose of standardization.
>>>>
>>>> I have started feeling that no change is the best way out.
>>>>
>>>> Nat
>>>>
>>>> [1]  If instead of saying "Token endpoint - used by the client to
>>>> exchange an authorization grant for an access token, typically with
>>>> client authentication", it were saying "Token endpoint - used by the
>>>> client to exchange an authorization grant for tokens, typically with
>>>> client authentication", then it would have been OK. It is an expansion of
>>>> the capability rather than changing the semantics.
>>>>
>>>>
>>>>
>>>> 2014-07-23 13:39 GMT-04:00 Mike Jones <michael.jo...@microsoft.com>:
>>>>
>>>>>  You need the alternative response_type value ("code_for_id_token" in
>>>>> the A4C draft) to tell the Authorization Server to return a code to be 
>>>>> used
>>>>> with the new grant type, rather than one to use with the
>>>>> "authorization_code" grant type (which is what response_type=code does).
>>>>>
>>>>>
>>>>>
>>>>> *From:* OAuth [mailto:oauth-boun...@ietf.org] *On Behalf Of *John
>>>>> Bradley
>>>>> *Sent:* Wednesday, July 23, 2014 10:33 AM
>>>>> *To:* tors...@lodderstedt.net
>>>>>
>>>>> *Cc:* oauth@ietf.org
>>>>> *Subject:* Re: [OAUTH-WG] New Version Notification for
>>>>> draft-hunt-oauth-v2-user-a4c-05.txt
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> If we use the token endpoint then a new grant_type is the best way.
>>>>>
>>>>>
>>>>>
>>>>> It sort of overloads code, but that is better than messing with
>>>>> response_type for the authorization endpoint to change the response from
>>>>> the token_endpoint.  That is in my opinion a champion bad idea.
>>>>>
>>>>>
>>>>>
>>>>> In discussions developing Connect we decided not to open this can of
>>>>> worms because no good would come of it.
>>>>>
>>>>>
>>>>>
>>>>> The token_endpoint returns a access token.  Nothing requires scope to
>>>>> be associates with the token.
>>>>>
>>>>>
>>>>>
>>>>> That is the best solution.  No change required.  Better
>>>>> interoperability in my opinion.
>>>>>
>>>>>
>>>>>
>>>>> Still on my way to TO, getting in later today.
>>>>>
>>>>>
>>>>>
>>>>> John B.
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> Sent from my iPhone
>>>>>
>>>>>
>>>>> On Jul 23, 2014, at 12:15 PM, tors...@lodderstedt.net wrote:
>>>>>
>>>>>  The "response type" of the token endpoint is controlled by the value
>>>>> of the parameter "grant_type". So there is no need to introduce a new
>>>>> parameter.
>>>>>
>>>>> wrt to a potential "no_access_token" grant type. I do not consider
>>>>> this a good idea as it changes the semantics of the token endpoint (as
>>>>> already pointed out by Thomas). This endpoint ALWAYS responds with an
>>>>> access token to any grant type. I therefore would prefer to use another
>>>>> endpoint for the intended purpose.
>>>>>
>>>>> regards,
>>>>> Torsten.
>>>>>
>>>>>
>>>>>
>>>>> Am 23.07.2014 13:04, schrieb Nat Sakimura:
>>>>>
>>>>>  IMHO, changing the semantics of "response_type" @ authz endpoint
>>>>> this way is not a good thing.
>>>>>
>>>>>
>>>>>
>>>>> Instead, defining a new parameter "response_type" @ token endpoint, as
>>>>> I described in my previous message,
>>>>>
>>>>> probably is better. At least, it does not change the semantics of the
>>>>> parameters of RFC6749.
>>>>>
>>>>>
>>>>>
>>>>>  Nat
>>>>>
>>>>>
>>>>>
>>>>> 2014-07-23 12:48 GMT-04:00 Thomas Broyer <t.bro...@gmail.com>:
>>>>>
>>>>> No, I mean response_type=none and response_type=id_token don't
>>>>> generate a code or access token so you don't use the Token Endpoint (which
>>>>> is not the same as the Authentication Endpoint BTW).
>>>>>
>>>>> With response_type=code_for_id_token, you get a code and exchange it
>>>>> for an id_token only, rather than an access_token, so you're changing the
>>>>> semantics of the Token Endpoint.
>>>>>
>>>>>
>>>>>
>>>>> I'm not saying it's a bad thing, just that you can't really compare
>>>>> none and id_token with code_for_id_token.
>>>>>
>>>>>
>>>>>
>>>>> On Wed, Jul 23, 2014 at 6:45 PM, Richer, Justin P. <jric...@mitre.org>
>>>>> wrote:
>>>>>
>>>>> It's only "not using the token endpoint" because the token endpoint
>>>>> copy-pasted and renamed the authentication endpoint.
>>>>>
>>>>>
>>>>>
>>>>>  -- Justin
>>>>>
>>>>>
>>>>>
>>>>> On Jul 23, 2014, at 9:30 AM, Thomas Broyer <t.bro...@gmail.com> wrote:
>>>>>
>>>>>
>>>>>
>>>>>  Except that these are about not using the Token Endpoint at all,
>>>>> whereas the current proposal is about the Token Endpoint not returning an
>>>>> access_token field in the JSON.
>>>>>
>>>>>
>>>>>
>>>>> On Wed, Jul 23, 2014 at 4:26 PM, Mike Jones <
>>>>> michael.jo...@microsoft.com> wrote:
>>>>>
>>>>> The response_type "none" is already used in practice, which returns no
>>>>> access token.  It was accepted by the designated experts and registered in
>>>>> the IANA OAuth Authorization Endpoint Response Types registry at
>>>>> http://www.iana.org/assignments/oauth-parameters/oauth-parameters.xml#endpoint.
>>>>> The registered "id_token" response type also returns no access token.
>>>>>
>>>>>
>>>>>
>>>>> So I think the question of whether response types that result in no
>>>>> access token being returned are acceptable within OAuth 2.0 is already
>>>>> settled, as a practical matter.  Lots of OAuth implementations are already
>>>>> using such response types.
>>>>>
>>>>>
>>>>>
>>>>>                                                             -- Mike
>>>>>
>>>>>
>>>>>
>>>>> *From:* OAuth [mailto:oauth-boun...@ietf.org] *On Behalf Of *Phil Hunt
>>>>> *Sent:* Wednesday, July 23, 2014 7:09 AM
>>>>> *To:* Nat Sakimura
>>>>> *Cc:* <oauth@ietf.org>
>>>>> *Subject:* Re: [OAUTH-WG] New Version Notification for
>>>>> draft-hunt-oauth-v2-user-a4c-05.txt
>>>>>
>>>>>
>>>>>
>>>>> Yes. This is why it has to be discussed in the IETF.
>>>>>
>>>>>
>>>>>
>>>>> Phil
>>>>>
>>>>>
>>>>>
>>>>> @independentid
>>>>>
>>>>> www.independentid.com
>>>>>
>>>>> phil.h...@oracle.com
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> On Jul 23, 2014, at 9:43 AM, Nat Sakimura <sakim...@gmail.com> wrote:
>>>>>
>>>>>
>>>>>
>>>>> Reading back the RFC6749, I am not sure if there is a good way of
>>>>> suppressing access token from the response and still be OAuth. It will
>>>>> break whole bunch of implicit definitions like:
>>>>>
>>>>>
>>>>>
>>>>> authorization server
>>>>>       The server issuing access tokens to the client after successfully
>>>>>       authenticating the resource owner and obtaining authorization.
>>>>>
>>>>>
>>>>>
>>>>> After all, OAuth is all about issuing access tokens.
>>>>>
>>>>>
>>>>>
>>>>> Also, I take back my statement on the grant type in my previous mail.
>>>>>
>>>>>
>>>>>
>>>>> The definition of grant and grant_type are respectively:
>>>>>
>>>>>
>>>>>
>>>>> grant
>>>>>
>>>>>     credential representing the resource owner's authorization
>>>>>
>>>>>
>>>>>
>>>>> grant_type
>>>>>
>>>>>     (string representing the) type of grant sent to the token endpoint
>>>>> to obtain the access token
>>>>>
>>>>>
>>>>>
>>>>> Thus, the grant sent to the token endpoint in this case is still
>>>>> 'code'.
>>>>>
>>>>>
>>>>>
>>>>> Response type on the other hand is not so well defined in RFC6749, but
>>>>> it seems it is representing what is to be returned from the authorization
>>>>> endpoint. To express what is to be returned from token endpoint, perhaps
>>>>> defining a new parameter to the token endpoint, which is a parallel to the
>>>>> response_type to the Authorization Endpoint seems to be a more symmetric
>>>>> way, though I am not sure at all if that is going to be OAuth any more. 
>>>>> One
>>>>> straw-man is to define a new parameter called response_type to the token
>>>>> endpoint such as:
>>>>>
>>>>>
>>>>>
>>>>> response_type
>>>>>
>>>>>     OPTIONAL. A string representing what is to be returned from the
>>>>> token endpoint.
>>>>>
>>>>>
>>>>>
>>>>> Then define the behavior of the endpoint according to the values as
>>>>> the parallel to the multi-response type spec.
>>>>>
>>>>> http://openid.net/specs/oauth-v2-multiple-response-types-1_0.html
>>>>>
>>>>>
>>>>>
>>>>> Nat
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> 2014-07-23 7:21 GMT-04:00 Phil Hunt <phil.h...@oracle.com>:
>>>>>
>>>>> The draft is very clear.
>>>>>
>>>>> Phil
>>>>>
>>>>>
>>>>> On Jul 23, 2014, at 0:46, Nat Sakimura <sakim...@gmail.com> wrote:
>>>>>
>>>>>  The new grant type that I was talking about was
>>>>>
>>>>> "authorization_code_but_do_not_return_access_nor_refresh_token", so to
>>>>> speak.
>>>>>
>>>>> It does not return anything per se, but an extension can define
>>>>> something on top of it.
>>>>>
>>>>>
>>>>>
>>>>> Then, OIDC can define a binding to it so that the binding only returns
>>>>> ID Token.
>>>>>
>>>>> This binding work should be done in OIDF. Should there be such a grant
>>>>> type,
>>>>>
>>>>> it will be an extremely short spec.
>>>>>
>>>>>
>>>>>
>>>>> At the same time, if any other specification wanted to define
>>>>>
>>>>> other type of tokens and have it returned from the token endpoint,
>>>>>
>>>>> it can also use this grant type.
>>>>>
>>>>>
>>>>>
>>>>> If what you want is to define a new grant type that returns ID Token
>>>>> only,
>>>>>
>>>>> then, I am with Justin. Since "other response than ID Token" is only
>>>>>
>>>>> theoretical, this is a more plausible way forward, I suppose.
>>>>>
>>>>>
>>>>>
>>>>> Nat
>>>>>
>>>>>
>>>>>
>>>>> 2014-07-22 14:30 GMT-04:00 Justin Richer <jric...@mit.edu>:
>>>>>
>>>>> So the draft would literally turn into:
>>>>>
>>>>> "The a4c response type and grant type return an id_token from the
>>>>> token endpoint with no access token. All parameters and values are defined
>>>>> in OIDC."
>>>>>
>>>>> Seems like the perfect mini extension draft for OIDF to do.
>>>>>
>>>>> --Justin
>>>>>
>>>>> /sent from my phone/
>>>>>
>>>>>
>>>>> On Jul 22, 2014 10:29 AM, Nat Sakimura <sakim...@gmail.com> wrote:
>>>>> >
>>>>> > What about just defining a new grant type in this WG?
>>>>> >
>>>>> >
>>>>> > 2014-07-22 12:56 GMT-04:00 Phil Hunt <phil.h...@oracle.com>:
>>>>> >>
>>>>> >> That would be nice. However oidc still needs the new grant type in
>>>>> order to implement the same flow.
>>>>> >>
>>>>> >> Phil
>>>>> >>
>>>>> >> On Jul 22, 2014, at 11:35, Nat Sakimura <sakim...@gmail.com> wrote:
>>>>> >>
>>>>> >>> +1 to Justin.
>>>>> >>>
>>>>> >>>
>>>>> >>> 2014-07-22 9:54 GMT-04:00 Richer, Justin P. <jric...@mitre.org>:
>>>>> >>>>
>>>>> >>>> Errors like these make it clear to me that it would make much
>>>>> more sense to develop this document in the OpenID Foundation. It should be
>>>>> something that directly references OpenID Connect Core for all of these
>>>>> terms instead of redefining them. It's doing authentication, which is
>>>>> fundamentally what OpenID Connect does on top of OAuth, and I don't see a
>>>>> good argument for doing this work in this working group.
>>>>> >>>>
>>>>> >>>>  -- Justin
>>>>> >>>>
>>>>> >>>> On Jul 22, 2014, at 4:30 AM, Thomas Broyer <t.bro...@gmail.com>
>>>>> wrote:
>>>>> >>>>
>>>>> >>>>>
>>>>> >>>>>
>>>>> >>>>>
>>>>> >>>>> On Mon, Jul 21, 2014 at 11:52 PM, Mike Jones <
>>>>> michael.jo...@microsoft.com> wrote:
>>>>> >>>>>>
>>>>> >>>>>> Thanks for your review, Thomas.  The "prompt=consent"
>>>>> definition being missing is an editorial error.  It should be:
>>>>> >>>>>>
>>>>> >>>>>>
>>>>> >>>>>>
>>>>> >>>>>> consent
>>>>> >>>>>>
>>>>> >>>>>> The Authorization Server SHOULD prompt the End-User for consent
>>>>> before returning information to the Client. If it cannot obtain consent, 
>>>>> it
>>>>> MUST return an error, typically consent_required.
>>>>> >>>>>>
>>>>> >>>>>>
>>>>> >>>>>>
>>>>> >>>>>> I'll plan to add it in the next draft.
>>>>> >>>>>
>>>>> >>>>>
>>>>> >>>>> It looks like the consent_required error needs to be defined
>>>>> too, and you might have forgotten to also import 
>>>>> account_selection_required
>>>>> from OpenID Connect.
>>>>> >>>>>
>>>>> >>>>>>
>>>>> >>>>>>
>>>>> >>>>>>
>>>>> >>>>>> I agree that there's no difference between a response with
>>>>> multiple "amr" values that includes "mfa" and one that doesn't.  Unless a
>>>>> clear use case for why "mfa" is needed can be identified, we can delete it
>>>>> in the next draft.
>>>>> >>>>>
>>>>> >>>>>
>>>>> >>>>> Thanks.
>>>>> >>>>>
>>>>> >>>>> How about "pwd" then? I fully understand that I should return
>>>>> "pwd" if the user authenticated using a password, but what "the service if
>>>>> a client secret is used" means in the definition for the "pwd" value?
>>>>> >>>>>
>>>>> >>>>> (Nota: I know you're at IETF-90, I'm ready to wait 'til you come
>>>>> back ;-) )
>>>>> >>>>>
>>>>> >>>>> --
>>>>> >>>>> Thomas Broyer
>>>>> >>>>> /tɔ.ma.bʁwa.je/ <http://xn--nna.ma.xn--bwa-xxb.je/>
>>>>> >>>>> _______________________________________________
>>>>> >>>>> OAuth mailing list
>>>>> >>>>> OAuth@ietf.org
>>>>> >>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>> >>>>
>>>>> >>>>
>>>>> >>>>
>>>>> >>>> _______________________________________________
>>>>> >>>> OAuth mailing list
>>>>> >>>> OAuth@ietf.org
>>>>> >>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>> >>>>
>>>>> >>>
>>>>> >>>
>>>>> >>>
>>>>> >>> --
>>>>> >>> Nat Sakimura (=nat)
>>>>> >>> Chairman, OpenID Foundation
>>>>> >>> http://nat.sakimura.org/
>>>>> >>> @_nat_en
>>>>> >>>
>>>>> >>> _______________________________________________
>>>>> >>> OAuth mailing list
>>>>> >>> OAuth@ietf.org
>>>>> >>> https://www.ietf.org/mailman/listinfo/oauth
>>>>> >
>>>>> >
>>>>> >
>>>>> >
>>>>> > --
>>>>> > Nat Sakimura (=nat)
>>>>> > Chairman, OpenID Foundation
>>>>> > http://nat.sakimura.org/
>>>>> > @_nat_en
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> --
>>>>> Nat Sakimura (=nat)
>>>>>
>>>>> Chairman, OpenID Foundation
>>>>> http://nat.sakimura.org/
>>>>> @_nat_en
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> --
>>>>> Nat Sakimura (=nat)
>>>>>
>>>>> Chairman, OpenID Foundation
>>>>> http://nat.sakimura.org/
>>>>> @_nat_en
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> --
>>>>> Thomas Broyer
>>>>> /tɔ.ma.bʁwa.je/ <http://xn--nna.ma.xn--bwa-xxb.je/>
>>>>>
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> --
>>>>> Thomas Broyer
>>>>> /tɔ.ma.bʁwa.je/ <http://xn--nna.ma.xn--bwa-xxb.je/>
>>>>>
>>>>>
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> --
>>>>> Nat Sakimura (=nat)
>>>>>
>>>>> Chairman, OpenID Foundation
>>>>> http://nat.sakimura.org/
>>>>> @_nat_en
>>>>>
>>>>>
>>>>>
>>>>> _______________________________________________
>>>>>
>>>>> OAuth mailing list
>>>>>
>>>>> OAuth@ietf.org
>>>>>
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>  _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>
>>>>>
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>
>>>>>
>>>>
>>>>
>>>> --
>>>> Nat Sakimura (=nat)
>>>> Chairman, OpenID Foundation
>>>> http://nat.sakimura.org/
>>>> @_nat_en
>>>>
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>
>>>>
>>
>>
>> --
>> Nat Sakimura (=nat)
>> Chairman, OpenID Foundation
>> http://nat.sakimura.org/
>> @_nat_en
>>
>   _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>   _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>


-- 
Nat Sakimura (=nat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to